• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于椭圆曲线密码体制的物联网可证明安全匿名认证与密钥协商方案的安全性评估

Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT.

作者信息

Park Kisung, Kim Myeonghyun, Park Youngho

机构信息

Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of Korea.

System Security Research Section, Electronics and Telecommunications Research Institute, Daejeon 34129, Republic of Korea.

出版信息

Sensors (Basel). 2025 Jan 3;25(1):237. doi: 10.3390/s25010237.

DOI:10.3390/s25010237
PMID:39797028
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11723078/
Abstract

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in "Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT" proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.

摘要

物联网(IoT)的激增加剧了维护数据和用户隐私的挑战。物联网终端设备通常部署在无人监管的环境中并连接到开放网络,容易受到物理篡改和各种其他安全攻击。因此,强大、高效的认证和密钥协商(AKA)协议对于保护终端设备与服务器之间交换数据时的数据隐私至关重要。之前发表在《用于物联网的基于椭圆曲线密码体制的可证明安全的匿名认证和密钥协商》中的工作提出了一种适用于安全物联网环境的新颖AKA方案。他们声称其协议具备全面的安全特性,能防范众多潜在缺陷,同时实现会话密钥安全。然而,本文通过逻辑和数学分析表明,先前的工作容易受到各种攻击。我们使用广泛应用于安全评估的扩展卡内蒂和克劳奇克(eCK)模型进行了安全分析。该模型考虑了攻击者完全控制网络的场景,包括拦截、修改和删除消息的能力,同时还考虑了临时私钥可能暴露的情况。此外,我们表明他们的方案未能满足关键安全要求,并且依赖有缺陷的安全假设。我们使用互联网安全协议和应用的自动验证(一种广受认可的形式验证工具)证明了我们的发现。为了增强抗攻击能力,我们针对专门为物联网环境设计的更强大、高效的AKA协议的发展提出了若干建议。

相似文献

1
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT.基于椭圆曲线密码体制的物联网可证明安全匿名认证与密钥协商方案的安全性评估
Sensors (Basel). 2025 Jan 3;25(1):237. doi: 10.3390/s25010237.
2
Efficient IoT User Authentication Protocol with Semi-Trusted Servers.具有半可信服务器的高效物联网用户认证协议
Sensors (Basel). 2025 Mar 23;25(7):2013. doi: 10.3390/s25072013.
3
Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.面向基于云的物联网环境的可证明安全的轻量级相互认证与密钥协商方案。
Sensors (Basel). 2023 Dec 11;23(24):9766. doi: 10.3390/s23249766.
4
A Lightweight ECC-Based Authentication and Key Agreement Protocol for IoT with Dynamic Authentication Credentials.一种用于物联网的基于轻量级椭圆曲线密码体制的具有动态认证凭证的认证与密钥协商协议。
Sensors (Basel). 2024 Dec 13;24(24):7967. doi: 10.3390/s24247967.
5
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
6
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments.用于多网关物联网环境的安全三因素认证协议
Sensors (Basel). 2019 May 22;19(10):2358. doi: 10.3390/s19102358.
7
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.基于 PUF 的无人机物联网中可证明安全的相互认证和密钥协商方案。
Sensors (Basel). 2023 Feb 10;23(4):2034. doi: 10.3390/s23042034.
8
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.基于物联网的医疗保健系统中具有可证明安全性的高效用户认证和用户匿名方案。
Sensors (Basel). 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482.
9
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.基于物联网的智能家居的安全轻量级认证协议。
Sensors (Basel). 2021 Feb 21;21(4):1488. doi: 10.3390/s21041488.
10
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function.iAKA-CIoT:一种使用物理不可克隆功能的改进型云物联网认证与密钥协商方案
Sensors (Basel). 2022 Aug 20;22(16):6264. doi: 10.3390/s22166264.

引用本文的文献

1
Lightweight authentication for IoT devices (LAID) in sustainable smart cities.可持续智慧城市中物联网设备的轻量级认证(LAID)
Sci Rep. 2025 Jul 14;15(1):25410. doi: 10.1038/s41598-025-10181-0.